EAP-ZKP: A Zero-Knowledge Proof based Authentication Protocol to Prevent DDoS Attacks a the Edge in Beyond 5G

被引:2
作者
Ramezan, Gholamreza [1 ]
Abdelnasser, Amr [1 ]
Liu, Bingyang [2 ]
Jiang, Weiyu [2 ]
Yang, Fei [2 ]
机构
[1] Huawei Technol Co Ltd, Waterloo, ON, Canada
[2] Huawei Technol Co Ltd, Beijing, Peoples R China
来源
2021 IEEE 4TH 5G WORLD FORUM (5GWF 2021) | 2021年
关键词
5G; Authentication; DDoS; EAP;
D O I
10.1109/5GWF52925.2021.00052
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
5G has introduced the primary and secondary authentication procedures to authenticate the user equipment requesting access to mobile network operators (MNOs) and service providers (SPs) data networks, respectively. However, the possibility of running distributed denial of service (DDoS) attacks on the MNO 5G core network (CN) and the SPs data networks still remains. In this paper, we introduce a zero- knowledge proof (ZKP) authentication algorithm called Partial- ZKP that authenticates users without revealing their service credentials. We show that Partial-ID ZKP has completeness and soundness properties. Based on Partial-ID ZKP, we then propose an extensible authentication protocol called EAP-ZKP that can be used in primary and secondary authentications to mitigate DDoS attacks al the CN edge. Finally, as a proof of concept, we implement EAP-ZKP in the 5G authentication procedure. Using the 5G simulators free5GC and gnbsim, we show that EAP-ZKP significantly reduces the authentication time for fake authentication attempts during DDoS attacks. Results also demonstrate that EAP-ZKP is able to recognize DD o S attack authentication attempts in about 10 msec. Interestingly, for the legitimate authentication attempts, the average authentication time slightly increases from 3.05 sec in current 5G authentication protocols to 3.06 sec in EAP-ZKP. This indicates that EAP-ZKP is promising for Beyond 5G.
引用
收藏
页码:259 / 264
页数:6
相关论文
共 17 条
[1]  
3GPP, 2020, 29561 3GPP TS
[2]  
3GPP, 2020, Tech. Rep.
[3]  
Albert A. A., 2018, Modern higher algebra
[4]  
[Anonymous], 2019, Tech. Rep
[5]  
Bhardwaj K., 2018, USENIX WORKSH HOT TO
[6]  
Blum M., 2019, NONINTERACTIVE ZERO, P329
[7]  
Ericsson and China Mobile, 2019, 3GPP TSG SA M 85 SEP, P1
[8]   THE KNOWLEDGE COMPLEXITY OF INTERACTIVE PROOF SYSTEMS [J].
GOLDWASSER, S ;
MICALI, S ;
RACKOFF, C .
SIAM JOURNAL ON COMPUTING, 1989, 18 (01) :186-208
[9]   Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network [J].
Gong, Seonghyeon ;
El Azzaoui, Abir ;
Cha, Jeonghun ;
Park, Jong Hyuk .
APPLIED SCIENCES-BASEL, 2020, 10 (02)
[10]   Context-Awareness Enhances 5G Multi-Access Edge Computing Reliability [J].
Han, Bin ;
Wong, Stan ;
Mannweiler, Christian ;
Crippa, Marcos Rates ;
Schotten, Hans D. .
IEEE ACCESS, 2019, 7 :21290-21299